How to Hack Computers

advertisement

How to Hack Computers: A Guide to Hacking Computers for Beginners

Introduction

How to Hack Computers


 The general public usually has two competing viewpoints of hackers. Some people revere them as brilliantly minded individuals while others look down on them as petty criminals. While both perceptions could be true for many expert hackers, the public’s perception has been twisted and contorted by what they see on television dramas and in the movies. Because your average user doesn’t understand how a computer or the Internet works from a technical perspective, they can’t hope to begin to understand what hackers actually do.

In this guide, I am going to teach you a lot of valuable information about hacking such as:

-What hacking is and what hacking isn’t.

-Hacking terminology and hacker culture.

-Types of attacks and the most famous hacks of all time.

-Ethical considerations and fair warnings about becoming a hacker.

-Fundamental concepts that will serve as a foundation to build hacking skills.

-How to install Linux operating systems using VMWare to setup hacking tools.

-Step-by-step guides for ping sweeps and port scanning.

-How to map network topologies and perform reconnaissance techniques.

-How to use advanced software to find security holes.

Excel Data Analysis

advertisement

Table of Contents

Contents

Chapter 1 – Introduction

What it Takes to Become a Good Hacker

Chapter 2 - An Overview of Hacking

Chapter 3 – Attack Types and Famous Viruses

1. Code Red

2. Sasser

3. Zeus

4. The I Love You Attack

5. Melissa

6. The Conficker Worm

7. MyDoom

8. Stuxnet

9. Crypto Locker

10. Flashback

In Summary

Chapter 4 – Ethical Considerations and Warnings

Chapter 5 – Networking Fundamentals

Understanding the OSI Model and Networking Terminology

IP Addressing Essentials

Subnet Masks

Two Special Network Addresses

MAC Addresses

ARP (Address Resolution Protocol)

Ports and Firewalls

In Summary

Chapter 6 - The Hacker’s Tool Belt

Vulnerability Scanners

Port Scanners

Layer 4 Scanners

Packet Sniffers

Password Cracking Utilities

Chapter 7 – Utilizing VMWare

Chapter 8 – Introduction to Ping Sweeps, Port Scanning, and NMAP

Ping Sweeps

Operating System Identification

Port Scanning

NMAP Footprinting Procedures: Installing NMAP

NMAP Footprinting Procedures: Ping Sweeps

NMAP Footprinting Procedures: Port Scanning

NMAP Footprinting Procedures: Operating System Identification

In Summary

Chapter 9 – Using Metasploit to Hack Devices

Basic Metasploit Commands

Chapter 10 – Wireless Password Hacking

VMWare Wireless Password Cracking Caveats

Docker Demonstration

Using Reaver to Crack Passwords

In Summary

Chapter 11 – Web-Based Vulnerabilities

SQL and SQLi Attacks

Cross-Site Scripting Techniques (XSS)

XSS Details and Web Browsers

Ways to Prevent SQLi and XSS

In Summary

Chapter 12 – OpenVAS

Installing OpenVAS

User and Port Configuration

Chapter 13 – Social Engineering

Types of Social Engineering Attacks

An Email from a Trusted Party

A False Request for Help

Baiting Targets

How to Protect Yourself from Social Engineering

Chapter 14 – Man-In-The-Middle Attacks

How to Perform a Man-In-The-Middle Attack

Chapter 15: Cracking Passwords

Password Cracking

Password Cracking Utilities

John the Ripper

Ophcrack

L0phtcrack

Cain & Abel

In Summary


Download full PDF in Comment section

advertisement

1 Comments

Previous Post Next Post